The present application relates generally to computer ecosystems and more particularly to digital rights management (DRM) transfer mechanisms.
A computer ecosystem, or digital ecosystem, is an adaptive and distributed socio-technical system that is characterized by its sustainability, self-organization, and scalability. Inspired by environmental ecosystems, which consist of biotic and abiotic components that interact through nutrient cycles and energy flows, complete computer ecosystems consist of hardware, software, and services that in some cases may be provided by one company, such as Sony. The goal of each computer ecosystem is to provide consumers with everything that may be desired, at least in part services and/or software that may be exchanged via the Internet. Moreover, interconnectedness and sharing among elements of an ecosystem, such as applications within a computing cloud, provides consumers with increased capability to organize and access data and presents itself as the future characteristic of efficient integrative ecosystems.
Two general types of computer ecosystems exist: vertical and horizontal computer ecosystems. In the vertical approach, virtually all aspects of the ecosystem are owned and controlled by one company, and are specifically designed to seamlessly interact with one another. Horizontal ecosystems, one the other hand, integrate aspects such as hardware and software that are created by other entities into one unified ecosystem. The horizontal approach allows for greater variety of input from consumers and manufactures, increasing the capacity for novel innovations and adaptations to changing demands.
Present principles are directed to specific aspects of computer ecosystems, specifically, allowing a user who owns entitlements to a piece of content to be temporarily viewable on a device that is otherwise unregistered for the DRM rights in the content.
Present principles accordingly are directed to sharing DRM protected content with friends and family without having to log their systems into the DRM server or registering their device on a DRM holder's account. An authorized device is allowed to transfer, temporarily, entitlement (such as in the form of DRM credentials) to a foreign device allowing playback of DRM protected content on the foreign device for a temporally bounded period. This enables a new paradigm for sharing content with others while preserving digital rights and the security of the content. The authorized device can first authenticate itself with a DRM server and request, e.g., a VOD (Video On Demand) entitlement for a piece of content residing, for instance, in an Ultra Violet or EST (Electronic Sell-Through) library. The authorized device may identify the request as an agent agreement fulfilling a transaction on behalf of a foreign device that is capable of receiving DRM protected content. The VOD license returned is valid only for a limited period of time and must be consumed in the presence of the authorized device. Accordingly, an authorized device includes at least one computer readable storage medium bearing instructions executable by a processor and at least one processor configured for accessing the computer readable storage medium to execute the instructions to configure the processor for receiving a license to play content on a target device. The license includes a first limitation indicating a time period and a second limitation indicating a presence requirement. Responsive to a command to play the content on the target device, the processor when executing the instructions is configured for determining whether current time falls within the time period, determining whether the authorized device receives presence signals from the target device, and providing the content to the target device only responsive to a determination that the current time falls within the time period and the authorized device receives presence signals from the target device.
In some embodiments the presence signals are near field communication (NFC) signals.
In example implementations the processor when executing the instructions is configured for streaming the content to the target device over a near field communication (NFC) link. If desired, the processor when executing the instructions may be configured for streaming the content to the target device over a non-near field communication link.
In some examples the processor when executing the instructions is configured for presenting on a display of the authorized device a user interface (UI) including a first selector selectable to permit a user to access the content temporarily on the target device. The UI may include a second selector selectable to input an identity of the target device to a network server. Remuneration may be given to a user or account associated with the authorized device responsive to inputting the identity of the target device to the network server. The example non-limiting UI may also include a third selector selectable to decline to enter the target device ID.
In another aspect, a method includes receiving, at a content server, a play signal to play content on a target device, and responsive to at least one presence signal from the authorized device indicating that the authorized device is in the presence of the target device, sending the content to the target device for play thereof on the target device.
In another aspect, a system includes at least one computer readable storage medium bearing instructions executable by a processor which is configured for accessing the computer readable storage medium to execute the instructions to configure the processor for requesting a license from a content source for a target device to play content on behalf of an authorized device. The authorized device is authenticated with the content source, but the target device is not authenticated with the target source. Responsive to receiving the license, the target device is enabled to play the content only during a time period imposed by the content source and only while the target device is in the presence of the authorized device.
The details of the present invention, both as to its structure and operation, can be best understood in reference to the accompanying drawings, in which like reference numerals refer to like parts, and in which:
This disclosure relates generally to computer ecosystems including aspects of consumer electronics (CE) device based user information in computer ecosystems. A system herein may include server and client components, connected over a network such that data may be exchanged between the client and server components. The client components may include one or more computing devices including portable televisions (e.g. smart TVs, Internet-enabled TVs), portable computers such as laptops and tablet computers, and other mobile devices including smart phones and additional examples discussed below. These client devices may operate with a variety of operating environments. For example, some of the client computers may employ, as examples, operating systems from Microsoft, or a UNIX operating system, or operating systems produced by Apple Computer or Google. These operating environments may be used to execute one or more browsing programs, such as a browser made by Microsoft or Google or Mozilla or other browser program that can access web applications hosted by the Internet servers discussed below.
Servers may include one or more processors executing instructions that configure the servers to receive and transmit data over a network such as the Internet. Or, a client and server can be connected over a local intranet or a virtual private network.
Information may be exchanged over a network between the clients and servers. To this end and for security, servers and/or clients can include firewalls, load balancers, temporary storages, and proxies, and other network infrastructure for reliability and security. One or more servers may form an apparatus that implement methods of providing a secure community such as an online social website to network members.
As used herein, instructions refer to computer-implemented steps for processing information in the system. Instructions can be implemented in software, firmware or hardware and include any type of programmed step undertaken by components of the system.
A processor may be any conventional general purpose single- or multi-chip processor that can execute logic using structure such as various lines such as address lines, data lines, and control lines and registers and shift registers.
Software modules described by way of the flow charts and user interfaces herein can include various sub-routines, procedures, etc. Without limiting the disclosure, logic stated to be executed by a particular module can be redistributed to other software modules and/or combined together in a single module and/or made available in a shareable library.
Present principles described herein can be implemented as hardware, software, firmware, or combinations thereof; hence, illustrative components, blocks, modules, circuits, and steps are set forth in terms of their functionality.
Further to what has been alluded to above, logical blocks, modules, and circuits described below can be implemented or performed with a general purpose processor, a digital signal processor (DSP), a field programmable gate array (FPGA) or other programmable logic device such as an application specific integrated circuit (ASIC), discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A processor can be implemented by a controller or state machine or a combination of computing devices.
The functions and methods described below, when implemented in software, can be written in an appropriate language such as but not limited to C# or C++, and can be stored on or transmitted through a computer-readable storage medium such as a random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), compact disk read-only memory (CD-ROM) or other optical disk storage such as digital versatile disc (DVD), magnetic disk storage or other magnetic storage devices including removable thumb drives, etc. A connection may establish a computer-readable medium. Such connections can include, as examples, hard-wired cables including fiber optics and coaxial wires and digital subscriber line (DSL) and twisted pair wires. Such connections may include wireless communication connections including infrared and radio.
Components included in one embodiment can be used in other embodiments in any appropriate combination. For example, any of the various components described herein and/or depicted in the Figures may be combined, interchanged or excluded from other embodiments.
“A system having at least one of A, B, and C” (likewise “a system having at least one of A, B, or C” and “a system having at least one of A, B, C”) includes systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.
Now specifically referring to
Accordingly, to undertake such principles the CE device 12 can be established by some or all of the components shown in
In addition to the foregoing, the CE device 12 may also include one or more input ports 26 such as, e.g., a USB port to physically connect (e.g. using a wired connection) to another CE device and/or a headphone port to connect headphones to the CE device 12 for presentation of audio from the CE device 12 to a user through the headphones. The CE device 12 may further include one or more tangible computer readable storage medium 28 such as disk-based or solid state storage, it being understood that the computer readable storage medium 28 may not be a carrier wave. Also in some embodiments, the CE device 12 can include a position or location receiver such as but not limited to a GPS receiver and/or altimeter 30 that is configured to e.g. receive geographic position information from at least one satellite and provide the information to the processor 24 and/or determine an altitude at which the CE device 12 is disposed in conjunction with the processor 24. However, it is to be understood that that another suitable position receiver other than a GPS receiver and/or altimeter may be used in accordance with present principles to e.g. determine the location of the CE device 12 in e.g. all three dimensions.
Continuing the description of the CE device 12, in some embodiments the CE device 12 may include one or more cameras 32 that may be, e.g., a thermal imaging camera, a digital camera such as a webcam, and/or a camera integrated into the CE device 12 and controllable by the processor 24 to gather pictures/images and/or video in accordance with present principles. Also included on the CE device 12 may be a Bluetooth transceiver 34 and other Near Field Communication (NFC) element 36 for communication with other devices using Bluetooth and/or NFC technology, respectively. An example NFC element can be a radio frequency identification (RFID) element.
Further still, the CE device 12 may include one or more motion sensors 37 (e.g., an accelerometer, gyroscope, cyclometer, magnetic sensor, infrared (IR) motion sensors such as passive IR sensors, an optical sensor, a speed and/or cadence sensor, a gesture sensor (e.g. for sensing gesture command), etc.) providing input to the processor 24. The CE device 12 may include still other sensors such as e.g. one or more climate sensors 38 (e.g. barometers, humidity sensors, wind sensors, light sensors, temperature sensors, etc.) and/or one or more biometric sensors 40 providing input to the processor 24. In addition to the foregoing, it is noted that in some embodiments the CE device 12 may also include a kinetic energy harvester 42 to e.g. charge a battery (not shown) powering the CE device 12.
Still referring to
Now in reference to the afore-mentioned at least one server 54, it includes at least one processor 56, at least one tangible computer readable storage medium 58 that may not be a carrier wave such as disk-based or solid state storage, and at least one network interface 60 that, under control of the processor 56, allows for communication with the other CE devices of
Accordingly, in some embodiments the server 54 may be an Internet server, may include and perform “cloud” functions such that the CE devices of the system 10 may access a “cloud” environment via the server 54 in example embodiments.
A second CE device 12a, which may include its own version of some or all of the components described in relation to the CE device 12, may communicate with the CE device 12 using, e.g., the respective near field communication transceivers of the device, for purposes to be shortly exposed.
Now referring to
Proceeding to block 72, the authorized device sends to the content source a request for temporary content. This request may include the name of the content, if required DRM credentials of the authorized device/user, and in some implementations an identification of the request as a temporary license request on behalf of another device (“target device”) such as the CE device 12a which is not registered or otherwise authorized by the content source to view the DRM-protected content that is the subject of the request. The content, which may be a VOD (Video On Demand), may reside, for instance, in an Ultra Violet or EST (Electronic Sell-Through) library controlled by the content source, e.g., a data structure on the medium 58 of the server 54.
As part of the request at block 72, the identity of the target device may not be required to be sent to the content source. However, in other embodiments the identity of the target device may be required by the content source. The request may also contain information related to the near field transceiver (e.g., element 36 in
Then, at block 74 a license is returned to the authorized device that permits, for only a limited time, e.g., one day, the authorized device to transfer the content to the target device for play on the target device at block 76 but only in the limited time period granted by the license and preferably only in the presence of the authorized device as indicated by, e.g., pairing between the two devices using their respective NFC transceivers.
In one example, enforcement of the time period limitation and enforcement of the requirement that the target device can play the content only in the presence of the authorized device is ensured programmatically by the DRM-compliant authorized device. For example, the authorized device, responsive to a command to play the content on the target device, streams the content to the target device but only during a license period specified by the license (with the period being ascertained by, e.g., a secure clock in the authorized device which is accessed by the processor of the authorized device) and only while the authorized device detects that it is paired with the target device over an NFC link, (e.g., as indicated by receiving signals from the target device at the NFC transceiver.) In this example, the content is first received by the authorized device from the content source over, e.g., the Internet using appropriate network interfaces, and then streamed from the authorized device to the target device using any appropriate communication path, including Wi-Fi_33, Bluetooth, wireless telephony, network path, wired or wireless, universal serial bus (USB) path, wired or wireless, and the like.
In another example, the license may constrain the authorized device to stream the content to the target device only during the license period, programmatically enforced by the authorized device as described above, and only using a near field communication path such as Bluetooth or a wired USB connection.
In another example, the content is encrypted by the source using NFC information from the authorized device sent to the source at block 72 of
The UI 80 may also offer the user a selector 84 permitting the user to access Title A temporarily on the target device, e.g., 12a shown in
Responsive to the user's authorized device receiving the license, the UI 90 shown in
In another implementation, the above principles may be followed except that the content is streamed from the server direct to the target device instead of being streamed from the authorized device to the target device responsive to receiving a play signal from either the target device or the authorized device and further responsive to the authorized periodically sending presence signals to the server assuring the server that the authorized device remains in the presence of the target device as indicated by, e.g., NFC signals from the target device received at an NFC transceiver of the authorized device.
While the particular COMPUTER ECOSYSTEM WITH TEMPORARY DIGITAL RIGHTS MANAGEMENT (DRM) TRANSFER is herein shown and described in detail, it is to be understood that the subject matter which is encompassed by the present invention is limited only by the claims.
Number | Name | Date | Kind |
---|---|---|---|
7318236 | Demello et al. | Jan 2008 | B2 |
7487128 | Spagna | Feb 2009 | B2 |
7577999 | Narin et al. | Aug 2009 | B2 |
7620809 | Prologo | Nov 2009 | B2 |
7770229 | Upendran | Aug 2010 | B2 |
7840489 | Candelore | Nov 2010 | B2 |
7962953 | Chandra et al. | Jun 2011 | B2 |
8005419 | Patsiokas et al. | Aug 2011 | B2 |
8166300 | Björkengren et al. | Apr 2012 | B2 |
8214912 | Lee et al. | Jul 2012 | B2 |
8271390 | Koppen et al. | Sep 2012 | B2 |
8321673 | Lee | Nov 2012 | B2 |
8502480 | Gerszberg | Aug 2013 | B1 |
8521131 | Ramalingam | Aug 2013 | B1 |
8626867 | Boudreau | Jan 2014 | B2 |
8726403 | Huang | May 2014 | B2 |
8806530 | Izdepski | Aug 2014 | B1 |
9094730 | Kirmse | Jul 2015 | B1 |
9268922 | Durbha | Feb 2016 | B2 |
20030028622 | Inoue | Feb 2003 | A1 |
20050060542 | Risan | Mar 2005 | A1 |
20050132209 | Hug | Jun 2005 | A1 |
20050144019 | Murakami | Jun 2005 | A1 |
20060046709 | Krumm | Mar 2006 | A1 |
20060123484 | Babic | Jun 2006 | A1 |
20060282394 | Jothipragasam | Dec 2006 | A1 |
20070192276 | Lee et al. | Aug 2007 | A1 |
20070202887 | Counts | Aug 2007 | A1 |
20070219917 | Liu et al. | Sep 2007 | A1 |
20080005034 | Kravitz | Jan 2008 | A1 |
20080066181 | Haveson | Mar 2008 | A1 |
20080120242 | Krig | May 2008 | A1 |
20080148363 | Gilder | Jun 2008 | A1 |
20090106847 | Krupman | Apr 2009 | A1 |
20090313471 | Björkengren et al. | Dec 2009 | A1 |
20110113122 | Drope | May 2011 | A1 |
20110131520 | Al-Shaykh | Jun 2011 | A1 |
20110239279 | Chandra et al. | Sep 2011 | A1 |
20110239280 | Chandra et al. | Sep 2011 | A1 |
20110320819 | Weber | Dec 2011 | A1 |
20120079129 | Rensin | Mar 2012 | A1 |
20120131606 | Lejeune et al. | May 2012 | A1 |
20120136749 | Hu et al. | May 2012 | A1 |
20120291140 | Robert et al. | Nov 2012 | A1 |
20130165040 | McIntyre | Jun 2013 | A1 |
20140041043 | Ha | Feb 2014 | A1 |
20140052872 | Varoglu | Feb 2014 | A1 |
20140105561 | Chen | Apr 2014 | A1 |
Entry |
---|
Mark A. Myers, “Metered Content”, http://ip.com/IPCOM/000171438, Jun. 9, 2008. |
Disclosed Anonymously, “Method for Social Lending of Digital Media via DRM”, http://ip/com/IPCOM/000202536, Dec. 21, 2010. |
Number | Date | Country | |
---|---|---|---|
20150154386 A1 | Jun 2015 | US |